SANS AUDIT 507 - Auditing Networks, Perimeters, and Systems | 3.65 GB
One of the most significant obstacles facing many auditors today is how exactly to go about auditing the security of an enterprise. What systems really matter? How should the firewall and routers be configured? What settings should be checked on the various systems under scrutiny? Is there a set of processes that can be put into place to allow an auditor to focus on the business processes rather than the security settings? All of these questions and more will be answered by the material covered in this course.
This course is organized specifically to provide a risk-driven method for tackling the enormous task of designing an enterprise security validation program. After covering a variety of high-level audit issues and general audit best practices, the students will have the opportunity to dive deep into the technical how-to for determining the key controls that can be used to provide a level of assurance to an organization. Tips on how to repeatedly verify these controls and techniques for automatic compliance validation will be given from real-world examples.
One of the struggles that IT auditors face today is assisting management to understand the relationship between the technical controls and the risks to the business that these affect. In this course these threats and vulnerabilities are explained based on validated information from real-world situations. The instructor will take the time to explain how this can be used to raise the awareness of management and others within the organization to build an understanding of why these controls specifically and auditing in general is important. From these threats and vulnerabilities, we will explain how to build the ongoing compliance monitoring systems and how to automatically validate defenses through instrumentation and automation of audit checklists.
Youll be able to use what you learn immediately. Five of the six days in the course will either produce or provide you directly with a general checklist that can be customized for your audit practice. Each of these days includes hands-on exercises with a variety of tools discussed during the lecture sections so that you will leave knowing how to verify each and every control described in the class. Each of the five hands-on days gives you the chance to perform a thorough technical audit of the technology being considered by applying the checklists provided in class to sample audit problems in a virtualized environment. Each student is invited to bring a Windows XP Professional or higher laptop for use during class. Macintosh computers running OS X may also be used with VMWare Fusion.
A great audit is more than marks on a checklist; it is the understanding of what the underlying controls are, what the best practices are, and why. Sign up for this course and experience the mix of theory, hands-on, and practical knowledge.
Who should attend:
Auditors seeking to identify key controls in IT systems
Audit professionals looking for technical details on auditing
Managers responsible for overseeing the work of an audit or security team
Security professionals newly tasked with audit responsibilities
System and network administrators looking to better understand what an auditor is trying to achieve, how they think, and how to better prepare for an audit
System and network administrators seeking to create strong change control management and detection systems for the enterprise
A sampling of topics
Audit planning and techniques
Effective risk assessment for control specification
Firewall and perimeter auditing
A proven six-step audit process
Time based auditing
Effective network population auditing
How to perform useful vulnerability assessments
Uncovering back doors
Building an audit toolkit
Detailed router auditing
Technical validation of network controls
Web application auditing
Rar Password (If Required) : shikshahelp.com
If you like my thread, please comment to keep topic live.
Thanks for download. ^^
Report if links dead